>From 5a97389c5c8ca1b3869b02677d6c352feef93738 Mon Sep 17 00:00:00 2001
From: Shawn Wells <[email protected]>
Date: Fri, 27 Dec 2013 00:28:43 -0500
Subject: [PATCH 08/31] Renamed deny_password_attempts to
accounts_passwords_pam_faillock_deny, moved to shared/
- Renamed XCCDF to match granular configuration setting
- Moved OVAL to shared/, updated CPE info, ln -s to RHEL directories after
testing
---
RHEL/6/input/auxiliary/stig_overlay.xml | 2 +-
RHEL/6/input/auxiliary/transition_notes.xml | 2 +-
.../accounts_passwords_pam_faillock_deny.xml | 49 +---------------------
RHEL/6/input/profiles/CS2.xml | 2 +-
RHEL/6/input/profiles/common.xml | 2 +-
.../6/input/profiles/fisma-medium-rhel6-server.xml | 2 +-
RHEL/6/input/profiles/nist-CL-IL-AL.xml | 2 +-
RHEL/6/input/profiles/rht-ccp.xml | 3 +-
RHEL/6/input/profiles/usgcb-rhel6-server.xml | 2 +-
RHEL/6/input/system/accounts/pam.xml | 2 +-
RHEL/7/input/auxiliary/transition_notes.xml | 2 +-
.../accounts_passwords_pam_faillock_deny.xml | 1 +
RHEL/7/input/profiles/rht-ccp.xml | 3 +-
RHEL/7/input/system/accounts/pam.xml | 2 +-
.../oval/accounts_passwords_pam_faillock_deny.xml | 49 ++++++++++++++++++++++
15 files changed, 65 insertions(+), 60 deletions(-)
mode change 100644 => 120000
RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
create mode 120000 RHEL/7/input/checks/accounts_passwords_pam_faillock_deny.xml
create mode 100644 shared/oval/accounts_passwords_pam_faillock_deny.xml
diff --git a/RHEL/6/input/auxiliary/stig_overlay.xml
b/RHEL/6/input/auxiliary/stig_overlay.xml
index 0e77ee6..652ce49 100644
--- a/RHEL/6/input/auxiliary/stig_overlay.xml
+++ b/RHEL/6/input/auxiliary/stig_overlay.xml
@@ -188,7 +188,7 @@
<VMSinfo VKey="38572" SVKey="50373" VRelease="1" />
<title>The system must require at least four characters be
changed between the old and new passwords during a password change.</title>
</overlay>
- <overlay owner="disastig" ruleid="deny_password_attempts"
ownerid="RHEL-06-000061" disa="44" severity="medium">
+ <overlay owner="disastig" ruleid="accounts_passwords_pam_faillock_deny"
ownerid="RHEL-06-000061" disa="44" severity="medium">
<VMSinfo VKey="38573" SVKey="50374" VRelease="1" />
<title>The system must disable accounts after three consecutive
unsuccessful login attempts.</title>
</overlay>
diff --git a/RHEL/6/input/auxiliary/transition_notes.xml
b/RHEL/6/input/auxiliary/transition_notes.xml
index d190b2c..e2f7db6 100644
--- a/RHEL/6/input/auxiliary/transition_notes.xml
+++ b/RHEL/6/input/auxiliary/transition_notes.xml
@@ -9,7 +9,7 @@
<note ref="768" auth="GG" rule="">This is not covered in RHEL 6 content</note>
-<note ref="766" auth="GG" rule="deny_password_attempts">This is covered in
RHEL 6 content</note>
+<note ref="766" auth="GG" rule="accounts_passwords_pam_faillock_deny">This is
covered in RHEL 6 content</note>
<note ref="762" auth="GG" rule="">This is not covered in RHEL 6 content</note>
diff --git a/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
b/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
deleted file mode 100644
index c682c33..0000000
--- a/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
+++ /dev/null
@@ -1,48 +0,0 @@
-<def-group>
- <definition class="compliance" id="accounts_passwords_pam_faillock_deny"
version="1">
- <metadata>
- <title>Lock out account after failed login attempts</title>
- <affected family="unix">
- <platform>Red Hat Enterprise Linux 6</platform>
- </affected>
- <description>The number of allowed failed logins should be set
correctly.</description>
- <reference source="swells" ref_id="20131025" ref_url="test_attestation"
/>
- </metadata>
- <criteria>
- <criterion comment="pam_faillock.so deny value set in system-auth"
test_ref="test_accounts_passwords_pam_faillock_deny_system-auth" />
- <criterion comment="pam_faillock.so deny value set in password-auth"
test_ref="test_accounts_passwords_pam_faillock_deny_password-auth" />
- </criteria>
- </definition>
-
- <ind:textfilecontent54_test check="all" check_existence="all_exist"
comment="check maximum failed login attempts allowed in /etc/pam.d/system-auth"
id="test_accounts_passwords_pam_faillock_deny_system-auth" version="1">
- <ind:object
object_ref="object_accounts_passwords_pam_faillock_deny_system-auth" />
- <ind:state
state_ref="state_accounts_passwords_pam_faillock_deny_system-auth" />
- </ind:textfilecontent54_test>
-
- <ind:textfilecontent54_test check="all" check_existence="all_exist"
comment="check maximum failed login attempts allowed in
/etc/pam.d/password-auth"
id="test_accounts_passwords_pam_faillock_deny_password-auth" version="1">
- <ind:object
object_ref="object_accounts_passwords_pam_faillock_deny_password-auth" />
- <ind:state
state_ref="state_accounts_passwords_pam_faillock_deny_password-auth" />
- </ind:textfilecontent54_test>
-
- <ind:textfilecontent54_object
id="object_accounts_passwords_pam_faillock_deny_system-auth" version="1">
- <ind:filepath>/etc/pam.d/system-auth</ind:filepath>
- <ind:pattern operation="pattern
match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
- <ind:instance datatype="int" operation="greater than or
equal">1</ind:instance>
- </ind:textfilecontent54_object>
-
- <ind:textfilecontent54_object
id="object_accounts_passwords_pam_faillock_deny_password-auth" version="1">
- <ind:filepath>/etc/pam.d/password-auth</ind:filepath>
- <ind:pattern operation="pattern
match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
- <ind:instance datatype="int" operation="greater than or
equal">1</ind:instance>
- </ind:textfilecontent54_object>
-
- <ind:textfilecontent54_state
id="state_accounts_passwords_pam_faillock_deny_system-auth" version="1">
- <ind:subexpression datatype="int" operation="equals"
var_ref="var_accounts_passwords_pam_faillock_deny" />
- </ind:textfilecontent54_state>
-
- <ind:textfilecontent54_state
id="state_accounts_passwords_pam_faillock_deny_password-auth" version="1">
- <ind:subexpression datatype="int" operation="equals"
var_ref="var_accounts_passwords_pam_faillock_deny" />
- </ind:textfilecontent54_state>
-
- <external_variable comment="number of failed login attempts allowed"
datatype="int" id="var_accounts_passwords_pam_faillock_deny" version="1" />
-</def-group>
diff --git a/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
b/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
new file mode 120000
index 0000000..7555d49
--- /dev/null
+++ b/RHEL/6/input/checks/accounts_passwords_pam_faillock_deny.xml
@@ -0,0 +1 @@
+../../../../shared/oval/accounts_passwords_pam_faillock_deny.xml
\ No newline at end of file
diff --git a/RHEL/6/input/profiles/CS2.xml b/RHEL/6/input/profiles/CS2.xml
index 8bb284c..9d33f72 100644
--- a/RHEL/6/input/profiles/CS2.xml
+++ b/RHEL/6/input/profiles/CS2.xml
@@ -17,7 +17,7 @@
<refine-value idref="var_password_history_retain_limit" selector="10"/>
<select idref="accounts_password_warn_age_login_defs" selected="true"/>
<select idref="account_disable_post_pw_expiration" selected="true" />
-<select idref="deny_password_attempts" selected="true" />
+<select idref="accounts_passwords_pam_faillock_deny" selected="true" />
<select idref="accounts_password_pam_cracklib_retry" selected="true"/>
<select idref="accounts_max_concurrent_login_sessions" selected="true"/>
<refine-value idref="var_accounts_max_concurrent_login_sessions" selector="3"/>
diff --git a/RHEL/6/input/profiles/common.xml b/RHEL/6/input/profiles/common.xml
index 3944bd4..01cb978 100644
--- a/RHEL/6/input/profiles/common.xml
+++ b/RHEL/6/input/profiles/common.xml
@@ -57,7 +57,7 @@
<select idref="accounts_password_pam_cracklib_ocredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_lcredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_difok" selected="true"/>
-<select idref="deny_password_attempts" selected="true"/>
+<select idref="accounts_passwords_pam_faillock_deny" selected="true"/>
<select idref="set_password_hashing_algorithm_systemauth" selected="true"/>
<select idref="set_password_hashing_algorithm_logindefs" selected="true"/>
<select idref="set_password_hashing_algorithm_libuserconf" selected="true"/>
diff --git a/RHEL/6/input/profiles/fisma-medium-rhel6-server.xml
b/RHEL/6/input/profiles/fisma-medium-rhel6-server.xml
index 16d7d29..55254b0 100644
--- a/RHEL/6/input/profiles/fisma-medium-rhel6-server.xml
+++ b/RHEL/6/input/profiles/fisma-medium-rhel6-server.xml
@@ -78,7 +78,7 @@
FISMA Refine: 3 attempts in 15 min -->
<refine-value idref="var_accounts_passwords_pam_faillock_deny" selector="3"/>
<refine-value idref="var_accounts_passwords_pam_faillock_fail_interval"
selector="900" />
-<select idref="deny_password_attempts" selected="true" />
+<select idref="accounts_passwords_pam_faillock_deny" selected="true" />
<select idref="accounts_passwords_pam_fail_interval" selected="true" />
<!-- AC-7(b)
diff --git a/RHEL/6/input/profiles/nist-CL-IL-AL.xml
b/RHEL/6/input/profiles/nist-CL-IL-AL.xml
index 5e9be13..29103c0 100644
--- a/RHEL/6/input/profiles/nist-CL-IL-AL.xml
+++ b/RHEL/6/input/profiles/nist-CL-IL-AL.xml
@@ -166,7 +166,7 @@ assurance."</description>
<select idref="sshd_disable_root_login" selected="true" \>
<!-- AC-7(a) -->
-<select idref="deny_password_attempts" selected="true" \>
+<select idref="accounts_passwords_pam_faillock_deny" selected="true" \>
<select idref="accounts_passwords_pam_fail_interval" selected="true" \>
<!-- AC-7(b) -->
diff --git a/RHEL/6/input/profiles/rht-ccp.xml
b/RHEL/6/input/profiles/rht-ccp.xml
index 9040055..b6df557 100644
--- a/RHEL/6/input/profiles/rht-ccp.xml
+++ b/RHEL/6/input/profiles/rht-ccp.xml
@@ -10,6 +10,7 @@
<refine-value idref="var_accounts_password_minlen_login_defs" selector="6"/>
<refine-value idref="var_password_max_age" selector="90"/>
<refine-value idref="var_accounts_minimum_age_login_defs" selector="7"/>
+<refine-value idref="var_accounts_passwords_pam_faillock_deny" selector="5" />
<refine-value idref="var_accounts_password_warn_age_login_defs" selector="7"/>
<refine-value idref="var_password_pam_cracklib_retry" selector="3"/>
<refine-value idref="var_password_pam_cracklib_dcredit" selector="1"/>
@@ -59,7 +60,7 @@
<select idref="accounts_password_pam_cracklib_ocredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_lcredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_difok" selected="true"/>
-<select idref="deny_password_attempts" selected="true"/>
+<select idref="accounts_passwords_pam_faillock_deny" selected="true"/>
<select idref="set_password_hashing_algorithm_systemauth" selected="true"/>
<select idref="set_password_hashing_algorithm_logindefs" selected="true"/>
<select idref="set_password_hashing_algorithm_libuserconf" selected="true"/>
diff --git a/RHEL/6/input/profiles/usgcb-rhel6-server.xml
b/RHEL/6/input/profiles/usgcb-rhel6-server.xml
index 4693fae..c8a7bfb 100644
--- a/RHEL/6/input/profiles/usgcb-rhel6-server.xml
+++ b/RHEL/6/input/profiles/usgcb-rhel6-server.xml
@@ -83,7 +83,7 @@
<refine-value idref="var_password_pam_cracklib_difok" selector="3" />
<select idref="accounts_password_pam_cracklib_difok" selected="true" />
<refine-value idref="var_accounts_passwords_pam_faillock_deny" selector="5" />
-<select idref="deny_password_attempts" selected="true" />
+<select idref="accounts_passwords_pam_faillock_deny" selected="true" />
<select idref="set_password_hashing_algorithm_systemauth" selected="true" />
<select idref="set_password_hashing_algorithm_logindefs" selected="true" />
<refine-value idref="var_password_history_retain_limit" selector="24" />
diff --git a/RHEL/6/input/system/accounts/pam.xml
b/RHEL/6/input/system/accounts/pam.xml
index f566344..aacab89 100644
--- a/RHEL/6/input/system/accounts/pam.xml
+++ b/RHEL/6/input/system/accounts/pam.xml
@@ -414,7 +414,7 @@ one to use pam_faillock,
and a second to use unlock_time and set it to a Value
-->
-<Rule id="deny_password_attempts" severity="medium">
+<Rule id="accounts_passwords_pam_faillock_deny" severity="medium">
<title>Set Deny For Failed Password Attempts</title>
<description>
To configure the system to lock out accounts after a number of incorrect login
diff --git a/RHEL/7/input/auxiliary/transition_notes.xml
b/RHEL/7/input/auxiliary/transition_notes.xml
index c1339c9..745e5c1 100644
--- a/RHEL/7/input/auxiliary/transition_notes.xml
+++ b/RHEL/7/input/auxiliary/transition_notes.xml
@@ -9,7 +9,7 @@
<note ref="768" auth="GG" rule="">This is not covered in RHEL 6 content</note>
-<note ref="766" auth="GG" rule="deny_password_attempts">This is covered in
RHEL 6 content</note>
+<note ref="766" auth="GG" rule="accounts_passwords_pam_faillock_deny">This is
covered in RHEL 6 content</note>
<note ref="762" auth="GG" rule="">This is not covered in RHEL 6 content</note>
diff --git a/RHEL/7/input/checks/accounts_passwords_pam_faillock_deny.xml
b/RHEL/7/input/checks/accounts_passwords_pam_faillock_deny.xml
new file mode 120000
index 0000000..7555d49
--- /dev/null
+++ b/RHEL/7/input/checks/accounts_passwords_pam_faillock_deny.xml
@@ -0,0 +1 @@
+../../../../shared/oval/accounts_passwords_pam_faillock_deny.xml
\ No newline at end of file
diff --git a/RHEL/7/input/profiles/rht-ccp.xml
b/RHEL/7/input/profiles/rht-ccp.xml
index f761500..cc17b32 100644
--- a/RHEL/7/input/profiles/rht-ccp.xml
+++ b/RHEL/7/input/profiles/rht-ccp.xml
@@ -10,6 +10,7 @@
<refine-value idref="var_accounts_password_minlen_login_defs" selector="6"/>
<refine-value idref="var_password_max_age" selector="90"/>
<refine-value idref="var_accounts_minimum_age_login_defs" selector="7"/>
+<refine-value idref="var_accounts_passwords_pam_faillock_deny" selector="5" />
<refine-value idref="var_accounts_password_warn_age_login_defs" selector="7"/>
<refine-value idref="var_password_pam_cracklib_retry" selector="3"/>
<refine-value idref="var_password_pam_cracklib_dcredit" selector="1"/>
@@ -58,7 +59,7 @@
<select idref="accounts_password_pam_cracklib_ocredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_lcredit" selected="true"/>
<select idref="accounts_password_pam_cracklib_difok" selected="true"/>
-<select idref="deny_password_attempts" selected="true"/>
+<select idref="accounts_passwords_pam_faillock_deny" selected="true"/>
<select idref="set_password_hashing_algorithm_systemauth" selected="true"/>
<select idref="set_password_hashing_algorithm_logindefs" selected="true"/>
<select idref="set_password_hashing_algorithm_libuserconf" selected="true"/>
diff --git a/RHEL/7/input/system/accounts/pam.xml
b/RHEL/7/input/system/accounts/pam.xml
index d17c439..fe14c0a 100644
--- a/RHEL/7/input/system/accounts/pam.xml
+++ b/RHEL/7/input/system/accounts/pam.xml
@@ -414,7 +414,7 @@ one to use pam_faillock,
and a second to use unlock_time and set it to a Value
-->
-<Rule id="deny_password_attempts" severity="medium">
+<Rule id="accounts_passwords_pam_faillock_deny" severity="medium">
<title>Set Deny For Failed Password Attempts</title>
<description>
To configure the system to lock out accounts after a number of incorrect login
diff --git a/shared/oval/accounts_passwords_pam_faillock_deny.xml
b/shared/oval/accounts_passwords_pam_faillock_deny.xml
new file mode 100644
index 0000000..1cc6c09
--- /dev/null
+++ b/shared/oval/accounts_passwords_pam_faillock_deny.xml
@@ -0,0 +1,49 @@
+<def-group>
+ <definition class="compliance" id="accounts_passwords_pam_faillock_deny"
version="1">
+ <metadata>
+ <title>Lock out account after failed login attempts</title>
+ <affected family="unix">
+ <platform>Red Hat Enterprise Linux 6</platform>
+ <platform>Red Hat Enterprise Linux 7</platform>
+ </affected>
+ <description>The number of allowed failed logins should be set
correctly.</description>
+ <reference source="swells" ref_id="20131025" ref_url="test_attestation"
/>
+ </metadata>
+ <criteria>
+ <criterion comment="pam_faillock.so deny value set in system-auth"
test_ref="test_accounts_passwords_pam_faillock_deny_system-auth" />
+ <criterion comment="pam_faillock.so deny value set in password-auth"
test_ref="test_accounts_passwords_pam_faillock_deny_password-auth" />
+ </criteria>
+ </definition>
+
+ <ind:textfilecontent54_test check="all" check_existence="all_exist"
comment="check maximum failed login attempts allowed in /etc/pam.d/system-auth"
id="test_accounts_passwords_pam_faillock_deny_system-auth" version="1">
+ <ind:object
object_ref="object_accounts_passwords_pam_faillock_deny_system-auth" />
+ <ind:state
state_ref="state_accounts_passwords_pam_faillock_deny_system-auth" />
+ </ind:textfilecontent54_test>
+
+ <ind:textfilecontent54_test check="all" check_existence="all_exist"
comment="check maximum failed login attempts allowed in
/etc/pam.d/password-auth"
id="test_accounts_passwords_pam_faillock_deny_password-auth" version="1">
+ <ind:object
object_ref="object_accounts_passwords_pam_faillock_deny_password-auth" />
+ <ind:state
state_ref="state_accounts_passwords_pam_faillock_deny_password-auth" />
+ </ind:textfilecontent54_test>
+
+ <ind:textfilecontent54_object
id="object_accounts_passwords_pam_faillock_deny_system-auth" version="1">
+ <ind:filepath>/etc/pam.d/system-auth</ind:filepath>
+ <ind:pattern operation="pattern
match">^\s*auth\s+(?:(?:required))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
+ <ind:instance datatype="int" operation="greater than or
equal">1</ind:instance>
+ </ind:textfilecontent54_object>
+
+ <ind:textfilecontent54_object
id="object_accounts_passwords_pam_faillock_deny_password-auth" version="1">
+ <ind:filepath>/etc/pam.d/password-auth</ind:filepath>
+ <ind:pattern operation="pattern
match">^\s*auth\s+(?:(?:sufficient)|(?:\[default=die\]))\s+pam_faillock\.so.*deny=([0-9]*).*$</ind:pattern>
+ <ind:instance datatype="int" operation="greater than or
equal">1</ind:instance>
+ </ind:textfilecontent54_object>
+
+ <ind:textfilecontent54_state
id="state_accounts_passwords_pam_faillock_deny_system-auth" version="1">
+ <ind:subexpression datatype="int" operation="equals"
var_ref="var_accounts_passwords_pam_faillock_deny" />
+ </ind:textfilecontent54_state>
+
+ <ind:textfilecontent54_state
id="state_accounts_passwords_pam_faillock_deny_password-auth" version="1">
+ <ind:subexpression datatype="int" operation="equals"
var_ref="var_accounts_passwords_pam_faillock_deny" />
+ </ind:textfilecontent54_state>
+
+ <external_variable comment="number of failed login attempts allowed"
datatype="int" id="var_accounts_passwords_pam_faillock_deny" version="1" />
+</def-group>
--
1.8.3.1
_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide